ID | Name |
---|---|
T1069.001 | Local Groups |
T1069.002 | Domain Groups |
T1069.003 | Cloud Groups |
Adversaries may attempt to find local system groups and permission settings. The knowledge of local system permission groups can help adversaries determine which groups exist and which users belong to a particular group. Adversaries may use this information to determine which users have elevated permissions, such as the users found within the local administrators group.
Commands such as net localgroup
of the Net utility, dscl . -list /Groups
on macOS, and groups
on Linux can list local groups.
ID | Name | Description |
---|---|---|
G0018 | admin@338 |
admin@338 actors used the following command following exploitation of a machine with LOWBALL malware to list local groups: |
S0521 | BloodHound |
BloodHound can collect information about local groups and members.[2] |
S0572 | Caterpillar WebShell |
Caterpillar WebShell can obtain a list of local groups of users from a system.[3] |
G0114 | Chimera |
Chimera has used |
S0154 | Cobalt Strike |
Cobalt Strike can use |
S0082 | Emissary |
Emissary has the capability to execute the command |
S0091 | Epic | |
S0696 | Flagpro |
Flagpro has been used to execute the |
S0381 | FlawedAmmyy |
FlawedAmmyy enumerates the privilege level of the victim during the initial infection.[9] |
S0170 | Helminth | |
S0201 | JPIN | |
S0265 | Kazuar |
Kazuar gathers information about local groups and members.[12] |
S0236 | Kwampirs |
Kwampirs collects a list of users belonging to the local users and administrators groups with the commands |
S0039 | Net |
Commands such as |
G0049 | OilRig |
OilRig has used |
G0116 | Operation Wocao |
Operation Wocao has used the command |
S0165 | OSInfo | |
S0378 | PoshC2 |
PoshC2 contains modules, such as |
S0184 | POWRUNER |
POWRUNER may collect local group information by running |
S0650 | QakBot |
QakBot can use |
S0692 | SILENTTRINITY |
SILENTTRINITY can obtain a list of local groups and members.[21] |
S0060 | Sys10 |
Sys10 collects the group name of the logged-in user and sends it to the C2.[22] |
G0131 | Tonto Team |
Tonto Team has used the |
G0010 | Turla |
Turla has used |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component |
---|---|---|
DS0017 | Command | Command Execution |
DS0009 | Process | Process Creation |
System and network discovery techniques normally occur throughout an operation as an adversary learns the environment. Data and events should not be viewed in isolation, but as part of a chain of behavior that could lead to other activities, such as Lateral Movement, based on the information obtained.
Monitor processes and command-line arguments for actions that could be taken to gather system and network information. Remote access tools with built-in features may interact directly with the Windows API to gather information. Information may also be acquired through Windows system management tools such as Windows Management Instrumentation and PowerShell.